
CHAPTER 4
147
4.4.4
Policy-Based Installation
Base policy files are used to start installations on hosts that already have
F-Secure Management Agent installed. F-Secure Policy Manager
Console creates an operation-specific installation package, which it
stores on the F-Secure Policy Manager Server, and writes an installation
task to the base policy files (thus, policy distribution is required to start
installations). Both base policy files and the installation package are
signed by the management key-pair so that only genuine information is
accepted by the hosts.
F-Secure Management Agent on the hosts fetches the new policies from
F-Secure Policy Manager Server and discovers the installation task.
F-Secure Management Agent fetches the installation package specified in
the task parameters from the server and starts installation program.
When the installation is complete, F-Secure Management Agent sends
the result of the installation operation in an incremental policy file to the
server. F-Secure Policy Manager Console discovers the new status
information and shows the results.
Uninstallation uses these same delivery mechanisms.
Using the Installation Editor
The Installation Editor must be used on those hosts that already have
F-Secure Management Agent installed. To access the Installation Editor,
open the Policy tab in the Properties pane and select the root node (the
F-Secure sub-tree). Alternatively, open the
Install
tab in the Properties
pane. The Installation Editor opens in the
Product View
pane.
In the Installation Editor, the administrator selects the products to be
installed on the currently selected host or policy domain.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...